Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Network resilience: a systematic approach

P Smith, D Hutchison, JPG Sterbenz… - IEEE …, 2011 - ieeexplore.ieee.org
The cost of failures within communication networks is significant and will only increase as
their reach further extends into the way our society functions. Some aspects of network …

Policy-based management: A historical perspective

R Boutaba, I Aib - Journal of Network and Systems Management, 2007 - Springer
This paper traces the history of policy-based management and how it evolved from the first
security models dating back to the late 1960's until today's more elaborate frameworks …

Policy-based management of networked computing systems

D Agrawal, KW Lee, J Lobo - IEEE Communications Magazine, 2005 - ieeexplore.ieee.org
This article provides an overview of the Policy Management for Autonomic Computing
(PMAC) platform, and shows how it can be used for the management of networked systems …

EXAM: a comprehensive environment for the analysis of access control policies

D Lin, P Rao, E Bertino, N Li, J Lobo - International Journal of Information …, 2010 - Springer
Policy integration and inter-operation is often a crucial requirement when parties with
different access control policies need to participate in collaborative applications and …

Data protection models for service provisioning in the cloud

D Lin, A Squicciarini - Proceedings of the 15th ACM symposium on …, 2010 - dl.acm.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. While cloud computing is expanding rapidly and used by many …

Anomaly discovery and resolution in web access control policies

H Hu, GJ Ahn, K Kulkarni - Proceedings of the 16th ACM symposium on …, 2011 - dl.acm.org
The advent of emerging technologies such as Web services, service-oriented architecture,
and cloud computing has enabled us to perform business services more efficiently and …

[图书][B] Data protection from insider threats

E Bertino - 2012 - books.google.com
As data represent a key asset for today's organizations, the problem of how to protect this
data from theft and misuse is at the forefront of these organizations' minds. Even though …

An approach to evaluate policy similarity

D Lin, P Rao, E Bertino, J Lobo - … of the 12th ACM symposium on Access …, 2007 - dl.acm.org
Recent collaborative applications and enterprises very often need to efficiently integrate
their access control policies. An important step in policy integration is to analyze the …

Usability challenges in security and privacy policy-authoring interfaces

RW Reeder, CM Karat, J Karat, C Brodie - Human-Computer Interaction …, 2007 - Springer
Policies, sets of rules that govern permission to access resources, have long been used in
computer security and online privacy management; however, the usability of authoring …